vulnerability

FreeBSD: VID-7240de58-6007-11e6-a6c3-14dae9d210b8 (CVE-2014-3953): FreeBSD -- Kernel memory disclosure in control messages and SCTP

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:C/I:N/A:N)
Published
Aug 11, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

Problem Description: Buffer between control message header and data may not be completely initialized before being copied to userland. [CVE-2014-3952] Three SCTP cmsgs, SCTP_SNDRCV, SCTP_EXTRCV and SCTP_RCVINFO, have implicit padding that may not be completely initialized before being copied to userland. In addition, three SCTP notifications, SCTP_PEER_ADDR_CHANGE, SCTP_REMOTE_ERROR and SCTP_AUTHENTICATION_EVENT, have padding in the returning data structure that may not be completely initialized before being copied to userland. [CVE-2014-3953] Impact: An unprivileged local process may be able to retrieve portion of kernel memory. For the generic control message, the process may be able to retrieve a maximum of 4 bytes of kernel memory. For SCTP, the process may be able to retrieve 2 bytes of kernel memory for all three control messages, plus 92 bytes for SCTP_SNDRCV and 76 bytes for SCTP_EXTRCV. If the local process is permitted to receive SCTP notification, a maximum of 112 bytes of kernel memory may be returned to userland. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.

Solutions

freebsd-upgrade-base-10_0-release-p7freebsd-upgrade-base-9_2-release-p10freebsd-upgrade-base-9_1-release-p17freebsd-upgrade-base-8_4-release-p14
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.